Linux By Example Fri, 13 May 2022 10:32:42 +0000 en-US hourly 1 Linux By Example 32 32 Thunderbird 102 includes an improved import tool Fri, 13 May 2022 06:22:30 +0000

The team that develops the Thunderbird email client has been working on the next major version of Thunderbird for some time. One of the new features of Thunderbird 102 is an improved data import tool.

Current versions of the email client support imports, but the process is not optimized. Some imports require the use of extensions, others, including moving data from one Thunderbird installation to another, a copy and paste process that requires knowledge of data paths and profiles.

The upcoming Thunderbird 102 will change that, at least for some data imports. The team highlighted the new import feature in a new blog post on the official website. The new feature was unveiled on Twitter by a member of the development team in late March, but the blog post reveals new information about the planned functionality.

According to the blog post, Thunderbird 102 has a step-by-step wizard that guides users through the process of entering important data into the email client. The first release in Thunderbird 102 supports importing data from Microsoft Outlook, SeaMonkey and other Thunderbird installations. Future plans to add support for other email services have not been announced, but there is a possibility that Thunderbird will support additional data sources in future versions.

The first screen of the new import wizard lists all available import options:

  • Import from another Thunderbird installation – Import settings, filters, messages and other data from a Thunderbird profile.
  • Import from a SeaMonkey installation – Import settings, filters, messages, and other data from a SeaMonkey profile.
  • Import from Outlook – Import accounts, address books and messages from Outlook.
  • Import from a file – Select a file to import address books, calendars or a profile backup (ZIP archive).

Precautions have been taken to ensure that duplicate data is not accidentally imported.

Especially the possibility to optimize the import of data from another Thunderbird installation is a welcome addition for many users. Currently it is necessary to copy the profile folder and the data it contains from the source Thunderbird installation and paste it into the profile folder of the new Thunderbird installation.

The new import feature also requires a data source, which users must ensure is available on the local system.

The final version of Thunderbird 102 is expected to be released in late June or early July 2022. The email client follows the Firefox release cycle, but instead of releasing new versions on a fixed date, they are released when they’re ready.

The Thunderbird team is also working on a mobile version of the email client for Android. A first version of the app is expected later this year.

Now you: What email clients do you use?


Thunderbird 102 includes an improved import tool

Product Name

Thunderbird 102 includes an improved import tool


One of the new features of Thunderbird 102 is an improved data import tool to improve importing from Thunderbird, Outlook and SeaMonkey.


Martin Brinkmann


Ghacks technology news



The Zerto 9.5 update adds Linux support and multi-cloud storage Thu, 12 May 2022 18:24:16 +0000

Zerto’s latest update to its Zerto platform adds support for Linux data recovery, a major upgrade for Kubernetes users, and new features for Microsoft Azure and Google Cloud Platform users.

The Zerto 9.5 update, now generally available to Zerto customers, brings new features to help organizations build cyber resiliency and data recovery. Key new features in the 9.5 update include support for immutable data in Microsoft Azure, a new Debian Linux virtual appliance for managing Zerto, and support for Google Cloud Platform storage.

Zerto, now a Hewlett Packard Enterprise company after its acquisition last year, sells disaster recovery, cyber resilience and other business continuity services through its Zerto platform, which uses virtual replication to enable granular data recovery.

Each of the 9.5 updates expands the capabilities of the Zerto platform, said Christophe Bertrand, practice director at Enterprise Strategy Group, a division of TechTarget.

Although part of HPE, Bertrand said, Zerto appears to remain operationally independent and able to develop technologies to combat ransomware without slowing down the development that such corporate maneuvers usually entail.

“Zerto goes wider and deeper and builds on the platform,” said Bertrand. “[Ransomware] is a broadband problem that requires a broadband solution.”

Container-centric future

The new pre-built Linux virtual appliance based on Debian Linux allows management of Zerto’s features and capabilities on Linux.

The Zerto platform previously operated in a Windows environment, but this addition allows Zerto to protect Linux environments with features such as automated upgrades and troubleshooting capabilities, according to Kevin Cole, Zerto’s director of technical marketing and training.

“This is the future of Zerto,” said Cole. “People want a platform that’s a little harder to infect and a little harder to spread.”

[Ransomware] is a broadband problem that requires a broadband solution.
Christopher BertrandPractice Leader, Enterprise Strategy Group

The need to secure containerized data is a growing market, according to Johnny Yu, research manager at IDC. Container service providers originally viewed storage infrastructure as ephemeral, but organizations are integrating operational workloads into container services and need enterprise-class protection.

“[This Linux appliance] seems to be the secret backroad to target the container people,” Yu said. “I see every reason to want to take care of this crowd.”

Zerto sells a Kubernetes-specific backup and disaster recovery service, Zerto for Kubernetes.

Linux’s popularity and open-source roots don’t guarantee a foolproof environment against ransomware, said Krista Macomber, senior analyst at the Evaluator Group, but Linux underpins the popular container orchestration platform, Kubernetes.

Kubernetes and other container platforms can provide greater data security due to the fragmented nature of microservices, but increase the infrastructure surface area for a potential attack, she said. The features that Zerto can provide for Linux, such as However, security technologies such as multi-factor authentication (MFA) and role-based access control (RBAC) can help mitigate these threats.

“Microservices architectures are gaining attention because they are potentially more secure,” Macomber said. “Features that Zerto added like MFA and RBAC and the ability to heal itself are important.”

The update also adds instant file recovery for Linux and enables file recovery in Linux VMs.

Constant azure

Zerto users looking to take advantage of hyperscaler clouds outside of AWS can now use native version-level immutability to protect and store immutable copies of data in Microsoft Azure. Zerto previously only supported AWS and its object locking feature to create and store immutable copies for long-term retention.

The update also adds support for Google Cloud Platform storage as a data copy destination. As of this update, Zerto does not support other native GCP features, including immutability.

Zero also expanded its partnership with Keepit with an update to Zerto Backup for SaaS and added support for Azure Active Directory, a cloud-based user identity and access management service.

Zerto launched Zerto Backup for SaaS last year with support for Microsoft 365, Salesforce and Google Workspace data.

Don’t commit yourself! Here are solid alternatives for Apple’s weaker software Thu, 12 May 2022 09:09:36 +0000 One of the best things about Apple’s Macintosh computers is that they come with a full suite of apps to get you productive out of the box. These are full-featured programs, not trialware titles that nag you pay to keep using them.

But what if you don’t particularly like what Apple has to offer? While most longtime Mac users tend to stick with Apple’s own software, newcomers or those not satisfied with the usual suspects will find better alternatives.

For example, I’ve never been a big fan of Mail, Apple’s e-mail program, nor do I like Safari, the web browser. I’ve spotted a couple of excellent apps that take their place, and this week I’ll point them out to you.

And as a bonus, for those on Windows who are Apple Music users — or who have a library of songs you downloaded from iTunes — I’ve found a promising replacement for the maligned iTunes for Windows.

Spark by Readdle


I lost access to Microsoft Office for Mac when I retired because I had been using it at the mercy of my corporate overlords. I’m not a fan of macOS Mail and, dare I say it? – I really like Outlook. But I’d rather not pay for it.

This sent me on a quest to find a decent free app; I found it in Spark, an email client for macOS, iOS, and Android, with Windows and web-based versions in the works. Spark is designed from the ground up as a cross-platform application, and the Ukraine-based developers have done a good job of making it easy to use on desktop and mobile devices.

When you install the app, you’ll be prompted to set up a Spark account and then start adding your email accounts. Once you’ve installed and configured Spark on one platform, setting it up for another simply involves logging into your Spark account. All your email accounts and settings will be transferred to your new device, and you’re good to go.

Spark follows Outlook’s design style, with inboxes and folders on the left, an email list in the middle, and a reading pane on the right. The app pushes you to use a unified inbox, but if you prefer to manage them individually (and I do!), you can view each account’s inbox in the left column. You can set up your accounts with smart inboxes where Spark’s artificial intelligence sorts and prioritizes for you, or you can go for a standard view-everything approach.

There are many other great features including a built-in calendar, granular control over notifications, delayed sending, follow-up reminders, and more. Best of all, it’s fast and responsive. I’ve never had a ban, which I can’t say for Apple’s Mail app or even Outlook.

It’s free, but Spark has a paid version with team collaboration features.

Edge by Microsoft


I know some of you Mac users balk when I recommend a Microsoft web browser, but listen to me. Many people with Macs use Chrome because it works on multiple platforms. And Edge is built on the same code foundation called Chromium, with versions for Windows, Mac, Linux, iOS, and Android. For me, Edge is superior to Chrome and Apple’s Safari for two reasons.

First, Edge gives you greater control over tracking prevention with three different settings: Basic, Balanced, and Strict. You can also apply these strict settings if you’re using Edge’s InPrivate Browsing (most other browsers’ private mode doesn’t prevent tracking). There’s a similar Balance/Strict security setting that gives you extra protection against drive-by malware and poisoned websites.

And all privacy and security settings – including clearing cookies and web caches – are in one place.

The second feature is my favorite thing about Edge. It allows you to view your different browser tabs vertically on the left side of the page rather than horizontally. If you have many horizontal tabs open at the same time, you know that the tabs will eventually shrink in size until you can no longer read their titles. But arranged vertically, you can always see the names of the pages.

Even if you’re a die-hard Safari or Chrome user, it’s worth giving Edge a try to experience the joy of vertical tabs. Multiple browsers easily coexist on the Mac, so Edge doesn’t replace your default web app. But I bet you will be tempted.

Free from Github, $1 from Microsoft Store,

In this polarized era, we can all agree: iTunes for Windows is the best. worst. Slow, crash-prone, and in dire need of an overhaul, it’s a necessary evil for those with a Windows computer who are Apple Music subscribers or manage a music collection purchased from iTunes.

Apple ditched iTunes on Macs in favor of the Music app some time ago; Windows users weren’t so lucky. But an open-source project called Cider brings much-needed relief. Available for Macs and iOS devices, the app offers a sleek interface for both your existing music library and your Apple Music streaming account. One big caveat though: This is very early alpha software, so bugs and crashes are guaranteed. Nevertheless, the potential is huge.

Cider focuses on music and doesn’t try to be a swiss army knife of all media like iTunes does. It also doesn’t allow you to sync, backup or update your iPhone or iPad. But its music focus makes it clean and intuitive, offering access to both your own library and Apple Music’s components, including Radio 1, streaming music, custom radio stations, and podcasts.

Dive deep into the settings and you’ll see intriguing features, not all of which work properly yet, but provide some insight into Cider’s goals. For example, the app can tweak its sound to emulate high-end audio devices or the “warm” tones of analog stereo systems. If you install the mobile beta app for iOS or Android, you can send the current state of your cider app to the mobile version, so you can pick up right where you left off.

I would recommend buying cider from Microsoft store for a money which keeps the app up to date. As it develops, it seems to be a real successor to iTunes.

Rocky Linux sponsor CIQ secures $26 million in funding • The Register Wed, 11 May 2022 17:27:00 +0000

interview CIQ, founding sponsor and services partner of Rocky Linux – a community build of Red Hat Enterprise Linux (RHEL) – receives a $26 million private funding injection led by Two Bear Capital.

The announcement comes after Red Hat finally announced RHEL 9 this week, which will be generally available in the “coming weeks”. The milestone is significant because Rocky Linux came in the wake of Red Hat’s confirmation that it would drop CentOS in favor of CentOS Stream by the end of 2020.

As we pointed out at the time, CentOS Stream is a free community distribution, but it’s a development build, only marginally ahead of the production version of RHEL, making it unsuitable for live production.

The registry spoke to CentOS project co-founder Gregory Kurtzer, who created Rocky Linux with the goal of being fully compatible (warts and all) with RHEL. Kurtzer is also the founder and CEO of CIQ.

“The first thing we focused on wasn’t building the operating system, but building the infrastructure to build the operating system,” explains Kurtzer The registry“because this infrastructure is so critical.

Rocky Linux has since released two releases, version 8.4 and 8.5, each narrowing the gap between RHEL’s release date and its own. However, there was a long gap between Rocky Linux’s latest announcement and that initial release.

“We built the infrastructure from the ground up, all within the Rocky Enterprise Software Foundation, all fully owned and managed by the community,” he says.

“CIQ obviously helped,” he adds, “but we mostly helped with funding, and then basically, you know, in some time as an engineer, but most of that actually came from the community.”

Rocky Linux is built in a cloud-native manner (instead of using the old on-premises cluster approach) and uses a build system called Peridot. “We’re going to do the open sourcing and release it all at the same time as the operating system,” says Kurtzer.

Which is great, but we’re pretty sure the investors led by Two Bear Capital want more bang for their buck than the warm, fuzzy feeling that comes with the backing of a worthy open source company.

“We’re building next-generation customer service,” says Kurtzer. Rather than slavishly focusing on tickets and permissions, “we’d rather focus on people.”

“We believe in helping customers and helping them solve problems and working with them,” he says, adding that it’s “not an organization that’s like, ‘What do we have to do to get the job done receive?’ deals.”

We can’t imagine who Kurtzer might be thinking of. However, Kurtzer is keen to emphasize the community ownership of Rocky Linux. However, the cash will be helpful.

“Where does this money go?” He asked, “Are we going to help help the community? Are we going to put that back into Rocky?

Rocky Linux 8.4

CentOS Stream: “I was slow to pick up, but now I understand what they’re doing,” says Rocky Linux founder


“And the answer is yes, to pretty much all of the above.”

CIQ is also a player in the world of High Performance Computing (HPC) with a stack ranging from bare metal deployment to containers, orchestration and federated computing.

It recently partnered with Google Cloud to make Rocky Linux a direct first-party offering from Google.

Speaking of Two Bear Capital, Michael Goguen, Founder and Managing Partner of Two Bear Capital (and now a member of CIQ’s Board of Directors), said, “We’re seeing the Linux landscape change for businesses as customers embrace the best technology from open source demand community without sacrificing enterprise-class responsive support and security.” ®

Global Electronic Document Management Systems Market Size, Growth, Forecast 2029 Wed, 11 May 2022 10:18:56 +0000

This practical and detailed Electronic Document Management Systems market report provides a clear picture of trade regulation, Electronic Document Management Systems market expansion, new product launches and innovations. It identifies Electronic Document Management System market trends and future market growth in 2022-2029. It also introduces Electronic Document Management System market competition among the major industry players in the market. The market research analysis is a useful tool for the growth of many businesses because this Electronic Document Management System market report provides a fundamental knowledge about Electronic Document Management System market movements and industry trends. It seeks to satisfy the demand for the products that help key players in earning large profits as they bring new items to the Electronic Document Management System market.

Get Free Sample Copy of Electronic Document Management System Market Report 2022:

The Global Electronic Document Management System Market Intelligence Report is a comprehensive overview of the Electronic Document Management System market position. Complete information on past advances, current market conditions and future prospects are included in the Electronic Document Management System report. It also gives an accurate view of the key strategy, Electronic Document Management System market size and the products of leading companies in this segment of the market. 2022 Materials, Applications and Electronic Document Management Systems Industry Forecasts Complete Report is expert and detailed research information on the global regional Electronic Document Management Systems market situation, focusing on each region.

Top companies reviewed in the Electronic Document Management Systems Market report:

Adobe Systems Corporation
Alfresco One software
CGI group
Dropbox business
eFiling cabinet

Have Questions About Electronic Document Management Systems Industry Report 2022?:

Types of products uploaded in Electronic Document Management System Market are:

installation and integration

Main uses of this report are:


This market will be significant for the growth of Electronic Document Management System during the forecast period. In addition, with the increasing popularity of electronic document management system, there will be an increase in new product launches and continuous innovation, which will lead to a boost in the market in the years to come. The Electronic Document Management System report provides the past, present and future Electronic Document Management System industry size, trends and forecast information in terms of expected revenue, growth, demand and supply scenario for Electronic Document Management System. Furthermore, the opportunities and threats for the development of the Electronic Document Management Systems Market forecast period from 2022 to 2029.

Get the full report for better understanding :

Electronic Document Management Systems Market is segmented into:

Electronic Document Management Systems Market in North America (United States, North American Country and Mexico),
European market (Germany, electronic document management system France market, UK, Russia and Italy),
Asia Pacific market (China, Electronic Document Management System Japan and Korea market, Asian nation and Southeast Asia),
Electronic document management system regions in South America include (Brazil, Argentina, Republic of Colombia, etc.),
Electronic Document Management System Africa (Saudi Arabian Peninsula, United Arab Emirates, Egypt, Nigeria and South Africa)

Finally, Electronic Document Management System report offers market information in the most comprehensive way. The reporting structure has been kept to offer maximum business value. The Electronic Document Management System report provides key insights into the market dynamics and enables strategic decision making for the existing market players as well as for those ready to enter the Electronic Document Management System market.

10 big announcements from Red Hat Summit 2022 Tue, 10 May 2022 18:33:00 +0000

IBM subsidiary Red Hat used its annual summit event to whet the appetite of developers for the upcoming latest version of their operating system Red Hat Enterprise Linux and to provide more information about the new features of RHEL 9 around edge computing, security and automation .

The Red Hat Summit, held virtually and in person in Boston this week, also included announcements for the Raleigh, NC-based company’s OpenShift container software suite, more validated patterns to accelerate building edge architectures, and updates to Ansible -Automation platform.

The summit also shared the calendar with Red Hat parent company IBM’s annual think event, which was also held virtually and in Boston.


Red Hat Exec: Training Investments Reflect ‘Renewed Emphasis On Partners’


According to Red Hat, more than 5,000 certified partner applications are provided by hundreds of Independent Software Vendors (ISVs). These applications focus on artificial intelligence, machine learning, development operations (DevOps), networking, and other areas.

Red Hat has proven to be a key enabler of IBM’s hybrid cloud growth strategy, with the tech giant reporting a 21 percent year-over-year increase in Red Hat revenue in its latest quarterly earnings report.

IBM’s consulting division has doubled its Red Hat-related signings year over year, with the Red Hat practice amassing a nearly $4.5 billion book of business from inception to date.

Recently appointed Red Hat channel chief Stefanie Chiras told CRN in an interview earlier this year that technologies that enable edge computing, artificial intelligence, and machine learning are some of the key technology partners the company will invest in.

Here’s what you need to know.

Red Hat Enterprise Linux 9 GA is coming

The Red Hat Enterprise Linux (RHEL) 9 operating system will be generally available “in the coming weeks,” according to the company.

RHEL 9 promises a more consistent experience across the open hybrid cloud, from bare metal servers to public clouds and enterprise network edges. Customers have the option to choose the underlying architecture, application provider, or cloud provider depending on their business.

This latest RHEL release is based on CentOS Stream, the continuously released Linux distribution that precedes RHEL. By building on CentOS Stream, the broader RHEL ecosystem, including partners, has an easier time providing feedback, code and feature updates, according to Red Hat.

RHEL 9 Edge features

According to Red Hat, when RHEL 9 becomes generally available, it will include improvements for edge computing.

According to Red Hat, RHEL 9 will offer comprehensive edge management as a service. This service enables users to monitor and scale remote deployments with greater security and control functionality. Users get zero-touch provisioning, system health visibility, and more responsive vulnerability mitigation from a single interface.

According to Red Hat, the latest RHEL version will also have automatic container rollback with the integrated container management technology Podman. Podman can automatically detect when a newly upgraded container fails to start and then roll back the container to the previous working version.

RHEL 9 also features a new image builder service that works with custom file systems and major cloud providers and virtualization technologies including Amazon Web Services, Google Cloud, Microsoft Azure and VMware.

Another key feature, according to Red Hat, is a simplified installer for remotely deploying systems with greater security at the edge or in a centralized data center. RHL 9 will have a FIDO Device Onboarding (FDO) technology preview to reduce time and cost for edge deployments and a gnome-kiosk mode for graphical environments with only essential components.

Security features of RHEL 9

According to Red Hat, RHEL 9 promises protection against hardware-level security vulnerabilities such as Specter and Meltdown.

The operating system is able to help user-space processes create areas of memory inaccessible to malicious code, and RHEL 9 provides Payment Card Industry Data Security Standard (PCI DSS) readiness, Health Insurance Portability and Accountability Act (HIPAA) and other customer collateral needs.

The RHEL 9 Integrity Measurement Architecture (IMA) digital hashes and signatures create a new way for users to detect fraudulent infrastructure changes, the company says.

New automation with RHEL 9

The new version of RHEL has an expanded set of system roles that can provide an automated workflow for specific configurations.

RHEL 9 provides system roles for Postfix, High Availability Cluster, Firewall, Microsoft SQL Server, Web Console and more.

Kernel live patching from the RHEL web console will allow IT operations teams to apply updates to large, distributed system deployments without having to access command-line tools, Red Hat said. This should simplify the way teams tackle problems from the core data center, through multiple clouds, to the edge.

Ken Goetz, Red Hat’s vice president of customer success, told CRN in a recent interview that the company has introduced new dynamic skills paths for partner training, including infrastructure modernization, IT automation, migrations, upgrades, container management, acceleration paths of application development and other use cases.

New Edge Partners

Red Hat announced two new edge partners in its ecosystem during the Summit.

Red Hat certified systems now work with edge computers from OnLogic of South Burlington, Vt., whose offerings include small, fanless industrial computers and powerful, rugged computers capable of handling artificial intelligence and machine learning workloads.

Intel Next Unit of Computing (NUC) Element modules are now certified for RHEL 8 and 9.

RHEL Edge Systems certification is also available to help partners drive customer interest in Edge. According to Red Hat, Dell Technologies, Hewlett Packard Enterprise (HPE), Lenovo and other partners offer RHEL Edge certified technology and expertise.

Red Hat OpenShift updates

Red Hat announced updates to its OpenShift container software suite, including more consistent functionality from edge to core to cloud with OpenShift Platform Plus.

Red Hat OpenShift 4.10, released in March, features zero-touch deployment aimed at enabling repeatable, automated setup of edge systems. Zero-Touch Provisioning (ZTP) includes factory operations for Original Equipment Manufacturers (OEMs).

According to Red Hat, manufacturers can preload relocatable OpenShift clusters on preferred hardware, giving customers a fully functional, preloaded cluster for faster deployment of Radio Access Networks (RANs).

Other OpenShift Edge updates include topology management with Red Hat Advanced Cluster Management. According to Red Hat, users can manage single-node OpenShift clusters, remote worker nodes, and compact three-node clusters. An Advanced Cluster Management Hub cluster can provision and manage 2,000 single-node OpenShift clusters.

New validated patterns

Red Hat Edge has received new validated patterns for IT teams that need to quickly build edge architectures.

Included is a medical diagnostic pattern that uses Git (GitOps) operations to help healthcare providers ingest, analyze, and act on medical images and data.

According to Red Hat, a multicloud GitOps pattern is aimed at organizations running workloads on different clusters in different public or private clouds.

Ansible updates

Red Hat’s Ansible Automation Platform features a new automation mesh visualization that shows where automations are running to provide scale where it’s needed.

According to Red Hat, users can scale capacity as edge environments grow and bring automation closer to edge workflows.

According to Red Hat, the recent re-architecture of the Ansible Automation Platform should also simplify scalable automation deployment across hybrid clouds and edge environments.

In December, Ansible Automation Platform 2.1 became available, with functionality around automation scaling, various environment connections and new developer tools for automation content.

GM collaboration

Red Hat announced a collaboration with General Motors to expand the ecosystem for the IBM subsidiary’s in-vehicle operating system, which is a Linux OS foundation for GM’s Ultifi software platform, which will be released in 2023.

Red Hat’s cloud-native, enterprise-ready, open-source operating system promises to accelerate vehicle application updates with ongoing security certification, according to the company. As a Linux-based system, Ultifi should be usable for almost all GM developers, suppliers and developers.

The integrated software will support infotainment, advanced driver assistance systems, body controls, connectivity and other safety-related and non-safety-related apps in the vehicle, according to Red Hat.

Kyndryl partnership

IBM subsidiary Red Hat and recent IBM spin-off Kyndryl announced a strategic partnership and integrated services and solutions based on the Ansible Automation Platform.

Kyndryl — formerly IBM’s managed infrastructure services business — will use Ansible Automation Platform as its primary enterprise automation solution for its infrastructure services, according to a statement.

New York-based Kyndryl becomes the leading service provider for Ansible Automation Platform. It already runs tens of millions of automations and manages more than 500,000 customer endpoints worldwide. Together, Kyndryl and Red Hat support approximately 900 customers worldwide.

Red Hat and Kyndryl will work together to build new storage and network automation capabilities across the Kyndryl services team. The two companies will also establish an Ansible Innovation Center to jointly develop services and jointly develop playbooks, enablement and support.

According to the company, Kyndryl service providers have more than 5,000 Red Hat certifications and accreditations to date.

Zero-Click Attacks Explained and Why They’re So Dangerous Tue, 10 May 2022 09:00:00 +0000

Zero-click attack definition

Unlike most cyberattacks, zero-click attacks do not require any interaction from the users they target, such as For example, clicking a link, enabling macros, or launching an executable file. They are sophisticated, often used in cyber espionage campaigns, and typically leave very little trace – which makes them dangerous.

Once a device is compromised, an attacker can install surveillance software or use a much more destructive strategy, encrypting the files and holding them for ransom. In general, a victim cannot tell when and how they were infected by a zero-click attack, meaning there is little users can do to protect themselves.

How zero-click attacks work

Fueled by the fast-growing surveillance industry, zero-click attacks have become increasingly popular in recent years. One of the most popular spyware programs is NSO Group’s Pegasus, which is used to monitor journalists, activists, world leaders, and corporate executives. Although it is not clear how each victim was targeted, it is believed that at least some of them received one WhatsApp call they didn’t even have to answer.

Messaging apps are often the target of zero-click attacks because they receive large amounts of data from unknown sources without requiring any intervention from the device owner. Most often, the attackers exploit a flaw in the validation or processing of data.

Other lesser-known types of zero-click attacks have stayed under the radar, says Aamir Lakhani, cybersecurity researcher at Fortinet’s FortiGuard Labs. He cites two examples: parser application exploits (“while a user is viewing an image in a PDF or email application, the attacker silently exploits a system without requiring user clicks or interactions”) and “WiFi Proximity attacks that try to find exploits use a WiFi stack and load the exploit code into it [the] user area [in the] kernel to take over systems remotely.”

Zero-click attacks are often based on zero-day vulnerabilities unknown to the software vendor. Because the manufacturer doesn’t know they exist, they can’t issue patches to fix them, which can put users at risk. “Even very alert and aware users cannot avoid these double zero-day, zero-click attacks,” says Lakhani.

These attacks are often used against high value targets because they are expensive. “Zerodium buying vulnerabilities on the open market, pays up to $2.5 million for zero-click vulnerabilities against Android,” said Ryan Olson, vice president of threat intelligence, Unit 42 at Palo Alto Networks.

Examples of zero-click attacks

The target of a zero-click attack can be anything from a smartphone to a desktop computer to an IoT device. One of the first defining moments in her story happened in 2010 when Security researcher Chris Paget demonstrated at DEFCON18 how phone calls and text messages can be intercepted using a Global System for Mobile Communications (GSM) vulnerability, explaining that the GSM protocol is broken by design. During his demo, he showed how easy it was for his International Mobile Subscriber Identity (IMSI) catcher to intercept the audience’s cell phone traffic.

Another early zero-click threat was discovered in 2015 when the Shedun Android malware family exploited the legitimate capabilities of the Android Accessibility Service to install adware without the user having to do anything. “By gaining permission to use the accessibility service, Shedun can read the text displayed on the screen, determine if an application installation prompt appears, scroll through the permissions list, and finally press the Install button without physical interaction from the user,” acc Danger.

A year later, in 2016, things got even more complicated. A zero-click attack was implemented in the United Arab Emirates’ monitoring tool Karma, which took advantage of a zero-day found in iMessage. Karma only needed a user’s phone number or email address. An SMS was then sent to the victim, who didn’t even have to click a link to become infected.

As soon as this text arrived on an iPhone, the attackers could see photos, emails and location data, among other things. Named the hacking entity that used this tool Project Ravenincluding US intelligence hackers who helped the UAE monitor governments and human rights activists.

Towards the end of that decade, zero-click attacks began to be noticed more frequently as surveillance companies and nation-state actors began developing tools that required no action from the user. “Attacks we previously saw via links in SMS became zero-click attacks via network injection,” says Etienne Maynier, technologist at Amnesty International.

Amnesty and Citizen Lab worked on several cases involving NSO Group’s Pegasus spyware, which has been linked to several murders, including that of the Washington Post journalist Jamal Khashoggi. Once installed on a phone, Pegasus can read text messages, track calls, monitor a victim’s location, access the device’s microphone and camera, collect passwords, and collect information from apps.

Khashoggi and his family were not the only victims. 2019, A bug in WhatsApp was exploited to address civil society and political figures in Catalonia. The attack began with a WhatsApp video call to the victim. There was no need to answer the call because the data sent to the chat app was not sanitized properly. This allowed the Pegasus code to run on the target device and effectively install the spyware software. WhatsApp has since patched this vulnerability and notified 1,400 affected users.

Another sophisticated zero-click attack related to NSO Group’s Pegasus was based on a vulnerability in Apple’s iMessage. In 2021, Citizen Lab found traces of this exploit used to target a Saudi activist. This attack relies on a flaw in iMessage’s GIF parsing and disguises a PDF document as a GIF with malicious code. In his analysis About the exploit, Google Project Zero stated: “The most striking finding is the depth of the attack surface, which is reachable from what will hopefully be a fairly limited sandbox.” The iMessage vulnerability was fixed in iOS 14.8 on September 13, 2021.

Zero-click attacks don’t just target phones. In 2021, a zero-click vulnerability gave unauthenticated attackers full control over Hikvision security cameras. Later that same year, a flaw in Microsoft Teams was found to be exploitable through a zero-click attack, giving hackers access to the target device across major operating systems (Windows, MacOS, Linux).

How to detect and mitigate zero-click attacks

Realistically, it’s pretty difficult to know if a victim is infected, and protecting yourself from a zero-click attack is almost impossible. “Zero-click attacks are a lot more common than we thought,” Maynier says. He recommends potential targets encrypt all their data, update their devices, use strong passwords and do whatever they can to protect their digital lives. There’s something else he tells them: “Bear in mind that you could be compromised and adapt accordingly.”

Still, users can do a few things to minimize the risk of being spied on. The easiest way is to restart the phone regularly if you own an iPhone. Amnesty experts have revealed that this could potentially prevent Pegasus from working on iOS – at least in the interim. This has the benefit of disabling any running code that hasn’t achieved persistence. The downside, however, is that restarting the device can erase signs of infection, making it much more difficult for security researchers to determine if a device has been compromised with Pegasus.

Users should also avoid jailbreaking their devices as this removes some of the security controls built into the firmware. Furthermore, since they can install unverified software on a jailbroken device, they are open to installing vulnerable code that could be a prime target for a zero-click attack.

As always, good safety hygiene can help. “Segmentation of networks, applications, and users, use of multi-factor authentication, use of strong traffic monitoring, good cybersecurity hygiene, and advanced security analytics can prove slowing or mitigating in certain situations,” says Lakhani. “[These] will also make post-exploitation activities more difficult for attackers, even if they are compromising [the] systems.”

Maynier adds that high-profile targets should separate data and have a device only for sensitive communications. He recommends users “keep as little information on their phone as possible (disappearing messages are a very good tool for this)” and keep it out of the room when having important personal conversations.

Organizations such as Amnesty and Citizen Lab have published guides instructing users to connect their smartphone to a PC and check if they have been infected with Pegasus. The software used for this, the Mobile Verification Toolkit, relies on well-known ones Indicators of compromise such as cached favicons and URLs in SMS messages. A user does not need to jailbreak their device to run this tool.

Additionally, Apple and WhatsApp have been sending messages to people who may have been the target of zero-click attacks aimed at installing Pegasus. After that, some of them turned to organizations like Citizen Lab to further analyze their devices.

However, technology alone will not solve the problem, says Amnesty’s Maynier. “It’s ultimately a matter of politics and regulation,” he adds. “Amnesty, EDRi and many other organizations Call for a global moratorium on the use, sale and transfer of surveillance technology until there is an adequate human rights legal framework that protects human rights defenders and civil society from the misuse of these tools.”

Policy responses need to cover different aspects of this problem, he says, from export controls to mandatory human rights due diligence for companies. “We need to stop these widespread abuses first,” Maynier added.

Copyright © 2022 IDG Communications, Inc.

Nebeus Adds Loans Backed by Avalanche Tue, 10 May 2022 08:00:00 +0000

BARCELONA, Spain, May 10, 2022 (GLOBE NEWSWIRE) — via InvestorWire — Nebeus, the cryptocurrency and crypto lending app, is constantly looking for innovative ways to help clients grow and improve their crypto investments. Nebeus users could already buy, sell, trade and exchange Avalanche (AVAX), but now AVAX can be used as collateral for Nebeus crypto loans. This new feature allows users to borrow against their Avalanche investments.

To have a loan backed by Nebeus AVAX:

  • Quick loans are immediate, pre-approved and come directly from Nebeus treasury, and offer a loan-to-value ratio of 50% at 0% interest for three months.
  • Flexible loans are tailored to individual needs, allowing customers to borrow up to 80% LTV in FIAT currency or crypto up to a maximum of 250,000 and with loan terms ranging from one to 36 months.

Additionally, flexible loans are risk free as they are backed by a 10 day buffer period to take action in the event of a margin call, and all collateral posted is insured up to $100 million by Lloyd’s of London. Even better, Nebeus users can enable an option called Automatic Margin Call Handling, allowing Nebeus to automatically handle crypto collateral when a margin call approaches.

Why Avalanche?

Avalanche is extremely adaptable and can power stablecoins and non-fungible tokens. This allows developers to establish private blockchains, called “subnets”, to validate transactions (consensus mechanism), providing more secure and efficient blockchain technology, as well as contributing to the open-source Avalanche community.

By developing the world’s fastest blockchain, Avalanche aims to change the costly, time-consuming, and environmentally harmful features of cryptocurrency transactions. Currently, the Avalanche blockchain can execute 4,500 transactions per second.

About Nebeus

Nebeus is one of Europe’s leading cryptocurrency and crypto lending apps and desktop platform that allows users to use their crypto investments for instant loans in FIAT, stablecoins and crypto currencies.

Additionally, Nebeus offers an ecosystem of cryptocurrency services that allow users to trade crypto, earn using their crypto, and even buy $100 million in insurance for their Bitcoin and Ethereum.

Note to Editors

Michael Stroev, COO and Head of Product at Nebeus, is available for interviews or commentary.

For press information, please contact:

Lucia Colli | Nebeus PR Manager


Wire Service Contact:

InvestorWire (IW)

Los Angeles, California

212.418.1217 Office

A photo accompanying this announcement is available at

]]> Pop!_OS 22.04 benchmarks on the Threadripper-powered System76 Thelio Major Mon, 09 May 2022 18:31:05 +0000

Late April saw the release of System76’s Pop!_OS 22.04, based on Ubuntu 22.04 but with a variety of improvements, from numerous graphics/desktop improvements to other changes like their scheduler work and more. For those currently running Pop!_OS 21.10 and wondering about the impact on performance, here are some benchmarks showing the difference in performance on the same hardware.

While Pop!_OS is not limited to System76 hardware, for this comparison I used the still incredibly powerful System76 Thelio Major with its AMD Ryzen Threadripper 3990X processor, Radeon RX 5700XT Navi graphics, 128GB RAM and Samsung 970 EVO Plus 500GB NVMe SSD storage.

Fresh installations of Pop!_OS 21.10 and Pop!_OS 22.04 were performed and the resulting performance in the out-of-the-box state of this System76 Linux distribution was considered.

Dozens of different benchmarks were run to determine the direction of Pop!_OS Linux performance on this AMD CPU/GPU system. Note that unlike upstream Ubuntu, Pop!_OS ships newer kernel versions and such to users, with Linux 5.17 being used by both Pop!_OS versions.

Club Management Software & Systems Market Future Scope Including Major Players MINDBODY, PushPress, Virtuagym, RhinoFit – Guam Buildup News Mon, 09 May 2022 10:36:53 +0000

A new research study from JCMR entitled Global Club Management Software and Systems Market Research Report 2022 provides an in-depth assessment of Club Management Software and Systems, including key market trends, upcoming technologies, industry drivers, challenges, regulatory policies and strategies. The research study provides projections for investments in Club Management Software & Systems up to 2030.

The report includes the latest post-pandemic market survey of Club Management Software and Systems Market.

Competitive Analysis: MINDBODY, PushPress, Virtuagym, RhinoFit, Glofox, Omnify, Zen Planner, Club OS, Wodify Pro, Fonbell, GymMaster, PushPress, EZFacility, Omnify, Zenoti

Request a Free Sample PDF Report @:

Frequently asked Questions:

  • How fast is the market expected to grow?

Annual growth for 2022 is estimated at XX% and the incremental growth of Club Management Software and Systems market is projected to reach XXX million US$.

Get Up To 40% Off Enterprise Copy & Customization available for the following regions and countries: North America, South & Central America, Middle East & Africa, Europe, Asia Pacific

  • Who are the top players in Club Management Software & Systems market space?

MINDBODY, PushPress, Virtuagym, RhinoFit, Glofox, Omnify, Zen Planner, Club OS, Wodify Pro, Fonbell, GymMaster, PushPress, EZFacility, Omnify, Zenoti

  • What are the key market drivers and challenges for Club Management Software & Systems?

The demand for strengthening ASW skills is one of the main factors driving the club management software and systems market.

  • How big is the club management software and systems market in North America?

North America region will contribute XX% of Club Management Software & Systems market share

Inquiry for Club Management Software and Systems segment: Purchase@
This bespoke Club Management Software and Systems report will also help clients keep abreast of new product launches in markets directly and indirectly related to COVID-19, upcoming vaccine and pipeline analysis, and significant developments in provider operations and government regulations

Club Management Software & Systems Geographic Analysis:

• Club Management Software and Systems Industry North America: United States, Canada and Mexico.

• Club Management Software and Systems Industry South and Central America: Argentina, Chile and Brazil.

• Club Management Software and Systems Industry Middle East and Africa: Saudi Arabia, United Arab Emirates, Turkey, Egypt and South Africa.

• Club Management Software & Systems Industry Europe: UK, France, Italy, Germany, Spain and Russia.

• Asia Pacific Club Management Software & Systems Industry: India, China, Japan, South Korea, Indonesia, Singapore and Australia.

Market Analysis by Types & Market Analysis by Applications are as follows:

Market segment by type into which the product can be divided
– Web based
– App based
Market segment by application, divided into
– small business
– Medium business
– large companies

Some of the Points Cover in Global Club Management Software & Systems Market Research Report are:

Chapter 1: Overview of Global Club Management Software & Systems Market (2015-2030)
• Club Management Software & System Definition
• Specifications of club management software and systems
• Classification of club management software and systems
• Club management software and system applications
• Regions for club management software and systems

Chapter 2: Club Management Software and Systems Market competition by player/supplier 2015 and 2022
• Cost structure for manufacturing club management software and systems
• Club Management Software & Systems Commodities and Suppliers
• Manufacturing process of club management software and systems
• Branch chain structure for club management software and systems

Chapter 3: Club Management Software and Systems Revenue (Volume) and Revenue (Value) by Region (2015-2022)
• Distribution of club management software and systems
• Club Management Software & Systems Revenue and Market Share

Chapter 4, 5 and 6: Global Club Management Software and Systems Market by Type, Application & Players/Suppliers Profiles (2015-2022)
• Market share of club management software and systems by type and application
• Growth rate of club management software and systems by type and application
• Drivers and capabilities for club management software and systems
• Basic information about the company Club Management Software & Systems


Note: Please let us know your budget by phone call/mail. We will try to meet your requirements @ Phone: +1 (925) 478-7203 / E-mail:
Find more research reports about Club Management Software & Systems Industry. By JC Market Research.

Thank you for reading this article; You can also get individual chapter wise section or regional report version like North America, Europe or Asia.

About the author:

The global research and market research advisory organization JCMR is uniquely positioned to not only identify growth opportunities, but also to empower and inspire you to create visionary growth strategies for the future, driven by our exceptional depth and breadth of thought leadership, research, tools, events and experiences that will help you turn goals into reality. Our understanding of the interaction of industry convergence, megatrends, technologies and market trends offers our customers new business models and expansion opportunities. We focus on identifying the “Accurate Prognosis” in each industry we cover so our clients can reap the benefits of early market entry and achieve their “Goals and Goals”.

Contact us:


Mark Baxter (Head of Business Development)

Phone: +1 (925) 478-7203


Connect with us at – LinkedIn